+

Shin et al., 2022 - Google Patents

Forensic analysis of note and journal applications

Shin et al., 2022

Document ID
8727801507884066864
Author
Shin S
Kim G
Kim S
Kim J
Publication year
Publication venue
Forensic Science International: Digital Investigation

External Links

Snippet

As the rate of smartphones into the general population has increased, apps that provide a wide range of functions have been developed. The usage records can remain within the app, and are a significant target for analysis from a digital forensic perspective. However …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
US12041166B2 (en) Protecting data using controlled corruption in computer networks
Gasti et al. On the security of password manager database formats
US9191811B2 (en) Method and system for managing information on mobile devices
US20200145389A1 (en) Controlling Access to Data
CA3156555C (en) Cryptographic key management
Park et al. Research on Note-Taking Apps with Security Features.
Shin et al. Forensic analysis of note and journal applications
Belenko et al. “Secure Password Managers” and “Military-Grade Encryption” on Smartphones: Oh, Really?
Park et al. Decrypting password-based encrypted backup data for Huawei smartphones
US10623400B2 (en) Method and device for credential and data protection
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
Hur et al. Data acquisition methods using backup data decryption of Sony smartphones
Gilbert et al. Forensic discoverability of ios vault applications
Sreelaja et al. An image edge based approach for image password encryption
Singh et al. Enhancing Data Security with KeyGuardian: Application of Fernet for Digital Asset Protection
WO2024157087A1 (en) Systems and methods for managing and protecting data in computing networks
Maqbali Strengthening Password-Based Authentication
Husny et al. Encrypted QR code system
WO2024147078A2 (en) Self-extracting archive for data protection
WO2023052845A2 (en) Protecting data using controlled corruption in computer networks
อ ลัน จีน et al. Strengthening Database Privacy: A Comprehensive Approach Using One Time Pad
Dhanesha et al. Pollux Alarm Vault
WO2025057190A1 (en) System and method of tracing call flow data of a user in a network
Chen Evaluation of Two-Dimensional Codes for Digital Information Security in Physical Documents
CN119416192A (en) A personal data security protection method, electronic device and storage medium
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载